[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Call for Papers, 2014 Symposium on Cryptography and Authentication (SCA2014) , Suzhou, China
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: Call for Papers, 2014 Symposium on Cryptography and Authentication (SCA2014) , Suzhou, China
- From: "2014 Symposium on Cryptography and Authentication \(SCA2014\) " <cis@xxxxxxx>
- Date: Mon, 28 Oct 2013 01:56:00 +0800 (CST)
<span id="unSub" style="FONT-SIZE: 10pt; FONT-FAMILY:
verdana,arial,helvetica,sans-serif; line-height:20px;">This message was sent to
[bugtraq@xxxxxxxxxxxxxxxxx]. <a
href="http://www.member.scirp.org/member/transferParameterAction.action?personID=7835691&identifier=5DFD5F85E4BE67FA9AE938BDE3C7410710FCD66EAA0F449D8C622F82188A7DE0&blackListTypeId=3"
target="_blank">Unsubscribe</a></span><br/><span id="showTem"
style="FONT-SIZE: 10pt; FONT-FAMILY: verdana,arial,helvetica,sans-serif;
line-height:20px;"> If you cannot read it, please click <a
href="http://edm.scirp.org/template/showTemplateInfo?showId=4794&personName="
target="_blank">here</a>.</span><html>
<head></head>
<body>
<table style="border-bottom:#5f712d 1px solid;border-left:#5f712d 1px
solid;border-top:#5f712d 1px solid;border-right:#5f712d 1px solid;"
class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" width="600">
<tbody>
<tr>
<td
style="padding-bottom:0px;padding-left:18px;padding-right:18px;padding-top:9px;">
<table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0"
width="100%">
<tbody>
<tr>
<td style="font-family:Arial, Helvetica,
sans-serif;color:#ff9966;font-size:24px;" align="center"><strong>Call for
Papers </strong></td>
</tr>
<tr>
<td style="font-family:Arial, Helvetica,
sans-serif;color:#ff9966;font-size:24px;" align="center"><strong>2014 Symposium
on Cryptography and Authentication (SCA2014) </strong></td>
</tr>
<tr>
<td style="font-family:Arial, Helvetica,
sans-serif;color:#ff9966;font-size:13pt;" align="right"> <p
align="center">Submission Due: Nov. 27, 2013 Conference: March
10-12, 2014</p></td>
</tr>
</tbody>
</table></td>
</tr>
<tr>
<td
style="padding-bottom:9px;padding-left:18px;padding-right:18px;padding-top:9px;">
<table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0"
width="100%">
<tbody>
<tr>
<td style="font-family:Arial, Helvetica,
sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966"
height="24"><strong>Dear Colleagues,</strong> </td>
</tr>
<tr>
<td
style="padding-bottom:9px;line-height:1.4;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:9px;"> We would
like to cordially invite you to submit or recommend papers to 2014 Symposium on
Cryptography and Authentication (SCA2014)! This conference will be held from
March 10 to 12, 2014 in Suzhou, China. The conference will bring together
leading researchers, engineers and scientists in the domain of interest from
around the world. More detailed information can be found at <a target="_blank"
href="http://www.engii.org/workshop/CIS2014March/Home.aspx?utm_campaign=sca&utm_source=e_cp&utm_medium=e_cp_conf_ws_sca_20131023">www.engii.org/workshop/CIS2014March</a>.
</td>
</tr>
</tbody>
</table></td>
</tr>
<tr>
<td
style="padding-bottom:9px;padding-left:18px;padding-right:18px;padding-top:9px;">
<table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0"
width="100%">
<tbody>
<tr>
<td style="font-family:Arial, Helvetica,
sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966" height="24"
colspan="2"><strong>Related Topics (more can be found in our website)
</strong></td>
</tr>
<tr>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Anti-Virus and Anti-Worms</td>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Key Management and Key Recovery</td>
</tr>
<tr>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Database Security</td>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Language-based Security</td>
</tr>
<tr>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Distributed Systems Security</td>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Security Evaluation</td>
</tr>
<tr>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Electronic Commerce Security</td>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Security for Mobile Computing</td>
</tr>
<tr>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Fraud Control</td>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Security Models</td>
</tr>
<tr>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Information Security Engineering</td>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • System Security</td>
</tr>
<tr>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Information Privacy</td>
<td
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;"
class="td2"> • Signature and Key Agreement Protocol</td>
</tr>
</tbody>
</table></td>
</tr>
<tr>
<td
style="padding-bottom:0px;padding-left:18px;padding-right:18px;padding-top:9px;">
<table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0"
width="100%">
<tbody>
<tr>
<td style="font-family:Arial, Helvetica,
sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966"
height="24"><strong>Technical Program Committee </strong></td>
</tr>
<tr>
<td
style="padding-bottom:9px;line-height:1.4;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:9px;"><p>
<b>Prof. Fagen Li</b>, University of Electronic Science and Technology of
China<br /> <b>Prof. Xiaochun Cheng</b>, Middlesex University<br /> <b>Prof.
Vic Grout</b>, Glyndwr University<br /> <b>Prof. Giannis F. Marias</b>, Athens
University of Economics and Business<br /> <b>Prof. Stavros D.
Nikolopoulos</b>, University of Ioannina<br /> <a target="_blank"
href="http://www.engii.org/workshop/CIS2014March/OrganizingCommittee.aspx?utm_campaign=sca&utm_source=e_cp&utm_medium=e_cp_conf_ws_sca_20131023">
>>More </a></p></td>
</tr>
</tbody>
</table></td>
</tr>
<tr>
<td
style="padding-bottom:9px;padding-left:18px;padding-right:18px;padding-top:9px;">
<table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0"
width="100%">
<tbody>
<tr>
<td style="font-family:Arial, Helvetica,
sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966"
height="24"><strong>Publication and Presentation</strong></td>
</tr>
<tr>
<td
style="padding-bottom:9px;line-height:1.4;padding-left:0px;padding-right:0px;font-family:Arial,
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:9px;"> All the
accepted papers will be published by "Journal of Computer and
Communications" (ISSN:2327-5219), a peer-reviewed open access journal that
can ensure the widest dissemination of your published work.<br /><br /> If you
want to present your research results but do NOT wish to publish a paper, you
may simply submit an Abstract to our <a target="_blank"
href="http://www.engii.org/Workshop2014/MarchSubmission/index.aspx?utm_campaign=sca&utm_source=e_cp&utm_medium=e_cp_conf_ws_sca_20131023">Registration
System</a>. </td>
</tr>
</tbody>
</table></td>
</tr>
<tr>
<td
style="padding-bottom:5px;padding-left:18px;padding-right:18px;padding-top:0px;">
<table width="100%">
<tbody>
<tr>
<td style="border-bottom:#666666 2px
solid;padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Trebuchet
MS,Arial,'TradeGothic-CondEighteen',Arial,Helvetica,sans-serif;color:#333333;font-size:13pt;font-weight:bold;padding-top:4px;"
class="td">Yours sincerely,</td>
</tr>
<tr>
<td
style="padding-bottom:0px;padding-left:0px;padding-right:0px;font-family:'TradeGothic-CondEighteen',Arial,Helvetica,sans-serif;color:#333333;font-size:17px;padding-top:0px;"
class="td2"> SCA Organizing Committee<br /> Email: CIS@xxxxxxxxx<br /> Tel :
+86- 132 6470 2230</td>
</tr>
</tbody>
</table></td>
</tr>
</tbody>
</table>
</body>
</html><img id="openURL"
src="http://www.member.scirp.org/emailopen/doSaveLogAction.action?email=bugtraq@xxxxxxxxxxxxxxxxx&personId=7835691&taskId=3426"
style="display:none;width:1px;height:1px;">